This didn’t work, every time I tried to run it I got the message :payloadTest.exe is not a valid Win32 application

Without the -x /root/testExe.exe -k it worked fine.

I’ve also tried shellter but it only works with 32 bit payloads.

The system I’m trying to attack is Windows 7 64 bit. The file “testExe” has a 64 bit architecture and works file without the payload on the victim’s system.

In short, I’m looking for a way to bind the windows/x64/meterpreter/reverse_tcp payload to an exe file called “testExe”, so that when the target opens the “testExe” file, the payload inside the file connects back to the attacker.

I’m trying to learn how payloads are injected into exe files and how they can be detected. I’ve seen some examples with installers that seem legit but they open a meterpreter session for the attacker. Is there a way to confirm that your exe file is legitamate and doesn’t have a backdoor in it (besides checking with antivirus).

Is there a way in Ubuntu 18.04 to map an SMB share when the users login without using a password file? The boxes I have are members of a Windows Active Directory domain and the users will use their domain credentials to authenticate. I want to automatically map drives for users and have the login be essentially passed from the user context like it is in Windows. I know there is the FSTAB and a way to use a password file for that, but I want to avoid making the users update that file when they change their domain password if possible.

Also, I have a csv file containing sentences separated by ‘,’. Each sentence contains a set of words separated by ‘ ‘.

I would like to read each word from the csv file and compare it with values of the column soundex_code from my_dictionary. And return its equivalent ‘translation’ I started this code but I didn’t know how to point on each word from my csv file and compare it.

For my Drupal 8 website I need to implement a PDF downloader. I have created a content type; which has a “File upload” fields. I have created a view, where all the titles of the nodes are displayed. In combination of “Views Bulk Operations” module and external php library I have created a new Action. After the user cheched the nodes, which he would like to download, the action should be initialized. My question is, how can I get the path to the file in the execute() function?

I have file with extension *.encrypted. Can you give me some advice how to recognise by witch tool was this file encrypted? It´s not encrypted by some ransomware but by some encrypt tool. When I open the file using a notepad, I can see this:

current my mongod.conf file has storage: dbPath: /var/lib/mongo journal: enabled: true so i what to add collection path as /var/lib/mongo and index path as /var/lib/mongo1 how can i add these path in configuration

I don’t use Google Drive very much, but I noticed I had a couple of files in the “shared with me” section of the Google Drive web app. So I decided to remove them from view, and the only way to do that is to delete them, one by one.

Removed one file.

One removed file is still accessible by collaborators.

I don’t own any of these files. They were shared with me. So what exactly did I just remove then? I can’t possibly remove things that I don’t own? I assume that the last notification indicates that the owner can still access his own file… duh! But the question still remains, what is it that I’m removing then? Removing myself from the access list of a file I didn’t own in the first place?…

Interestingly, most of these files were things like PDF files and shared Google Maps locations, things that were shared publicly, links to which I must have clicked on at some point on different websites. So I was never really “collaborating” with any of these people, the owners of these files, so they never shared the links to these files with me directly and I was never on any kind of access list.